SHARE
Facebook X Pinterest WhatsApp

HyTrust Centralizes Encryption Across Multiple Clouds

Five Common Data Encryption Myths Now that organizations have come to realize that the best way to protect their data is to encrypt, usage of various encryption technologies is on the rise. The challenge that many organizations face is that every platform they employ now provides access to some form of unique encryption technology that […]

Written By
MV
Mike Vizard
Aug 17, 2016
Slide Show

Five Common Data Encryption Myths

Now that organizations have come to realize that the best way to protect their data is to encrypt, usage of various encryption technologies is on the rise. The challenge that many organizations face is that every platform they employ now provides access to some form of unique encryption technology that needs to be managed.

Aiming to provide IT organizations with a centralized approach to managing encryption across multiple platforms, HyTrust today announced an update to a HyTrust DataControl platform that now supports a range of both public clouds, including Amazon Web Services and Microsoft Azure, as well as private cloud platforms, including VMware and hyperconvergence platforms from Nutanix and the VCE unit of EMC.

At the same time, HyTrust is also releasing an update to its HyTrust CloudControl access management software that adds support for analytics capabilities and tools for tracking system logs.

Fred Kost, senior vice president of marketing for HyTrust, says the encryption issue that IT organizations now have to contend with is that the public and private cloud platforms they support have their own encryption capabilities, each of which come with their own encryption key management schemes.

HyTrust DataControl provides a centralized approach to encryption key management that Kost says can be more consistently applied across multiple platforms.

“We now live in a multi-cloud world,” says Kost.

Of course, while encryption is now being employed more than ever, it’s not a panacea to IT security. If cybercriminals gain access to an endpoint that has permission to view encrypted data, they can see any and all data whether it’s encrypted or not.

But when it comes to data in transit or data that is at rest on a server, encrypting that data should now be routine. That may add a certain amount of overhead in terms of processing requirements and the processes required to manage encryption keys. But as the number of regulations that require data to be encrypted increases, there really is no alternative. In fact, in the not-too-distant future, not encrypting sensitive data is more than likely going to be deemed reckless by any number of regulatory bodies, and stiff penalties for not being so will be attached.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.